We use cookies to improve your browsing experience of our site. By continuing you agree to the use of cookies. If you wish to disable cookies click here to find what to do. Protecting your data and privacy is important to us. Click here to read more.

Important information regarding the sale of Integro USA.

Integro Holdings Inc., which held substantially all of the U.S. operations of Integro Insurance Brokers, has been sold to EPIC Insurance Brokers & Consultants. The addition of Integro USA significantly expands EPIC’s already substantial resources and service offerings. Click here to read more about the acquisition.

Integro’s UK business segments including Entertainment & Sport, Corporate and Private Clients, and Wholesale are not part of the sale to EPIC. Please click the following links for information on those segments: Entertainment & Sport, Corporate & Private Client, or Wholesale (trading under the Tysers brand).

Solutions That Move You Forward

Asset Assurance

Our Clients

Our brokers specialize in providing innovative, personal solutions to a wide variety of commercial and private clients with large, complex or delicate risks and specialized insurance needs. Our clients span a variety of industries and include large companies, small and midsize businesses and individuals. Get to know Integro and discover a refreshingly personal, intensely analytical and consistently thorough approach to managing risk.

It’s going to be an epic RIMS in Boston

Integro Launches Cyber Risk Practice

Integro today introduced an innovative Cyber Risk practice with a cutting-edge focus: the protection of ‘knowledge assets’, those exposures that go beyond the commonly accepted definition of data. The risks associated with knowledge assets are highlighted in the cyber study recently issued by the Ponemon Institute and Kilpatrick Townsend.

Beyond Breaches: Growing Issues in Information Security

Some of the biggest threats to information security involve controlling, damaging and interrupting systems while denying access to critical data and destroying data — rather than breaches. Organizations need to make certain that their security protocols take into consideration the protection of the “knowledge assets” that differentiate them from their competitors.